CVE-2022-49224

In the Linux kernel, the following vulnerability has been resolved: power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init kobject_init_and_add() takes reference even when it fails. According to the doc of kobject_init_and_add(): If this function returns an error, kobject_put() must be called to properly clean up the memory associated with the object. Fix memory leak by calling kobject_put().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

18 Mar 2025, 19:33

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-401
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: power: supply: ab8500: Se corrige la pérdida de memoria en ab8500_fg_sysfs_init kobject_init_and_add() toma la referencia incluso cuando falla. Según la documentación de kobject_init_and_add(): Si esta función devuelve un error, se debe llamar a kobject_put() para limpiar correctamente la memoria asociada con el objeto. Corrija la pérdida de memoria llamando a kobject_put().
References () https://git.kernel.org/stable/c/19aa3c98ed7b2616e105946cec804f897837ab84 - () https://git.kernel.org/stable/c/19aa3c98ed7b2616e105946cec804f897837ab84 - Patch
References () https://git.kernel.org/stable/c/261041097ab3470f1120b7733cbf472712304d1e - () https://git.kernel.org/stable/c/261041097ab3470f1120b7733cbf472712304d1e - Patch
References () https://git.kernel.org/stable/c/31cdf7897dba1f096b74f69d840f0575b8cdb9ae - () https://git.kernel.org/stable/c/31cdf7897dba1f096b74f69d840f0575b8cdb9ae - Patch
References () https://git.kernel.org/stable/c/41ed61364285ff38bbbe9ca8a45c8372ba72921d - () https://git.kernel.org/stable/c/41ed61364285ff38bbbe9ca8a45c8372ba72921d - Patch
References () https://git.kernel.org/stable/c/6a4760463dbc6b603690938c468839985189ce0a - () https://git.kernel.org/stable/c/6a4760463dbc6b603690938c468839985189ce0a - Patch
References () https://git.kernel.org/stable/c/879356a6a05559582b0a7895d86d2d4359745c08 - () https://git.kernel.org/stable/c/879356a6a05559582b0a7895d86d2d4359745c08 - Patch
References () https://git.kernel.org/stable/c/c32f6b6196b6efc1c68990dfeaac36fb8eb3b8e1 - () https://git.kernel.org/stable/c/c32f6b6196b6efc1c68990dfeaac36fb8eb3b8e1 - Patch
References () https://git.kernel.org/stable/c/db3a61ef8e6aef3b888baa6a85926c2230c2cc56 - () https://git.kernel.org/stable/c/db3a61ef8e6aef3b888baa6a85926c2230c2cc56 - Patch
References () https://git.kernel.org/stable/c/ffb8e92b4cef92bd25563cf3d8b4489eb22bc61f - () https://git.kernel.org/stable/c/ffb8e92b4cef92bd25563cf3d8b4489eb22bc61f - Patch

26 Feb 2025, 07:00

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:00

Updated : 2025-03-18 19:33


NVD link : CVE-2022-49224

Mitre link : CVE-2022-49224

CVE.ORG link : CVE-2022-49224


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime